cvelist/2022/26xxx/CVE-2022-26032.json

81 lines
2.7 KiB
JSON
Raw Normal View History

2022-03-10 17:27:52 +00:00
{
2023-02-16 20:00:38 +00:00
"data_version": "4.0",
2022-03-10 17:27:52 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-26032",
2023-02-16 20:00:38 +00:00
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
2022-03-10 17:27:52 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-02-16 20:00:38 +00:00
"value": "Uncontrolled search path element in the Intel(R) Distribution for Python programming language before version 2022.1 for Intel(R) oneAPI Toolkits may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Intel(R) Distribution for Python programming language for Intel(R) oneAPI Toolkits",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "before version 2022.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html",
"refsource": "MISC",
"name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00674.html"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
2022-03-10 17:27:52 +00:00
}
]
}
}